:->CybeR SecuriTy GeeKs<-:

This blog is about Ethical hacking and tips and tricks related to computer & Network technical issues, along with this you can discuss here about the IT security issues. Each and everyone have right to post his view through comments but no vulgar and abusive words are allowed otherwise we will take strict action on it.

Ethical Hacking and Security

Friday, 18 July 2014

Generally many people has a misconception about the hacker,Hackeris a term used by Many to mean "someone who tries
to break into computer systems or hack your facebook and bank account.“

This is not true Actually a hacker is A technology geek, who spends too much time with his computer and submerge with with the world of cyber. A hacker wants to invent new things in the world of computer and Technology. he think that not possible in the real manner or according to old theories.

Actually according to Wikipedia Hacker is A term that first started being used
in the 1960s and
was used to describe Someone who hacked out computer code, later the
term evolved to an individual

who had an
advanced understanding of computers, networking, programming, or hardware,

but did not have
any malicious intents.

In other words we can say media and most people think of hackersas malicious or evil, the majority of hackers are people who are curious about
how computer,

networks, or programs work and are often exploring and
learning.

what are the types of hackers ?

Most commonly people know about 4 types of hackers
According to theirwork

1.White Hat Hackers

2.Black Hat Hackers

3.Gray Hat Hackers

4.Suicide Hackers

1. White Hat Hackers

White hat describes a hackerwho identifies a security weakness in a computer system or network but, instead of taking malicious advantage of
it, exposes the weakness in a way that will allow the system's owners to fix the breach
before it can be taken advantage

by others (such as black hat hackers.) Methods of telling the owners about it
range from

a simple phone call through sending an e-mail note to a
Webmaster or administrator all

the way to leaving an message that security has been
breached.

2. Black Hat Hackers

Black hat is
used to describe ahacker(or, if you prefer, cracker) who breaks into a
computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes
advantage of the break-in, perhaps destroying files or stealing data for some
future purpose.

Theblack hat hacker may also make the exploit known to other hackers
and/or the public without notifying the victim. This gives others the
opportunity to exploit the vulnerability before the organization is able to
secure it.

3. Gray Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills
for legal or illegal acts, but not for personal gains. Grey hackers use their
skills in order to prove themselves that they can accomplish a determined feat,
but never do it in order to make money out of it. The moment they cross that
boundary, they become black hackers.

For example, they
may hack the computer network of a public agency, let us say, DRDO. That is a
federal crime.
If the authorities capture them, they
will feel the long arm of justice. However, if they only get inside, and post,
let me say, their handle, and get out without causing any kind of damage, then
they can be considered grey hackers.

4. Suicide Hackers

Suicide Hackers are individuals is who
aim to bring down critical infrastructure

for a “couse” and are not worried about facing 30 years in jail for
their actions.

Suicide hackers
are closely related to suicide bombers, who sacrifice their life for the

Attack and are not concerned with the consequences of
their action. There has been

A rise in cyber terrorism in recent years.

According to their behavior there are lots of categories in that we can divide hackerssome types are here :

Script kiddies –

These are the wannabe hackers. They are looked
down

upon in the hacker community because they are the people
that make

hackers look bad. Script kiddies usually have no hacking
skills

hackers without any knowledge of what’s happening behind
the scenes.

Intermediate hackers -

These people
usually know about computers, networks, and have enough

knowledge To
understand relatively
what a hack might do, but same as script kiddies

they use pre developed well-known
exploits

Elite Hackers –

These are the
skilled hackers. They are the ones that write

the many hacker tools and exploits out there. They can
break into systems

and hide their tracks or make it look like someone else
did it. You should

i am a technology loving guy who enjoy learning new technologies and teaching all the things i learned through Seminars, Workshops, and my Blogs (http://www.ITinformers.com/http://www.cybersecuritygeeks.blogspot.in) I want to become a excellent racer in my life. I am the miss creation of
god. my dreams are like a child i want to fly in the sky, walk on the
see, and ride my bike on clouds. that's why my favorite quote is "if you really want something, you can figure out how to make it happen."

Wednesday, 16 July 2014

Hello Geeks,
This is yogesh again here to teach you something as i promised you to start Free online ethical hacking classes, now i am back with the articles and amazing videos of ethical hacking and penetration testing. here is my first article in this series of free online ethical hacking classes.

First of all Unless you know how to hack, you cant know how to protect yourself from hackers. I am (yogesh vishwakarma) providing you Free ethical hacking and penetration testing tutorials here. i will also provide you guide to enter the world of ethical hacking and penetration testing.
we will understand this thing with an example, suppose you are living in a room or flat with your friend and he has a laptop.
will your friend give you the laptop's password?
never, because you have heard "HAR EK FRIEND KAMINA HOTA HAI!!!!"
but one day he leave the laptop in room and if you are a hacker what will you do is break the password of laptop's user password, right?
and he also told you when he did access you please don't open the D Drive
now what will you do is open the D Drive first, am i wrong that way?
a big NO!!
so this is the characteristics of an hacker!
now in the second condition your same friend forgot his laptop's password and you are a hacker oops sorry this time ethical hacker so he will come to you and will say "please help me out i forgot the password i will give you the treat"
Again you will do the same procissor for breaking the password but this time you are a ethical hacker because you did the things with the owners permission and also for helping him.
so now
what is ethical hacking and penetration testing ?
Hacking in ethical way (with the owners permission) or hacking for helping an individual or a company. ethical hacker find the weak points called "loopholes" or "vulnerability". organizations hire ethical hackers for testing their system's security for minimize the security breaches or loopholes.

Being ethical hackers you need to remember these things :
1. you have to permission to test the network, system, website or server to identify the breaches adn vulnerabilities.
2. don't forget to take a form of no objection.
3. you have to respect privacy of particular company or individual.

sometime ethical hacker can be part of criticism by people, they will say there is no thing like ethical hacking is always hacking, no matter how you are doing all these things.
the term hacker is actually a good word media and some people has banded this word and think "hackers are like theif, they steal information and personal accounts passwords."
NOTE: please give a review for this post via comment below, these valuable comment will encourage me to write more and more free articles for you!!!

i am a technology loving guy who enjoy learning new technologies and teaching all the things i learned through Seminars, Workshops, and my Blogs (http://www.ITinformers.com/http://www.cybersecuritygeeks.blogspot.in) I want to become a excellent racer in my life. I am the miss creation of
god. my dreams are like a child i want to fly in the sky, walk on the
see, and ride my bike on clouds. that's why my favorite quote is "if you really want something, you can figure out how to make it happen."

Wednesday, 26 February 2014

Today Nokia introduces a brand new family of smartphones, the Nokia X family, a range of handsets that combines Nokia design, build quality and services with the ability to run Android apps.

The first three phones in the family – the Nokia X, X+ and XL – are priced between 7600 INR to 9300 INR.

Check the specification

Nokia X

Nokia X+

Nokia XL

Screen

4-inch IPS LCD, 800 x 480px

4-inch IPS LCD, 800 x 480px

5-inch IPS LCD, 800 x 480px

RAM

512MB

768MB

768MB

Storage

Up to 32GBMicroSD

Up to 32GBMicroSD; 4GB card included

Up to 32GBMicroSD; 4GB card included

Rear camera

3-megapixel fixed focus

3-megapixel fixed focus

5-megapixel with autofocus and flash

Front camera

-

-

2-megapixel

Processor

8225 Qualcomm Snapdragon

1GHz Dual Core

8225 Qualcomm Snapdragon

1GHz Dual Core

8225 Qualcomm Snapdragon

1GHz Dual Core

Networks

ESGM 850 / 900 / 1800 / 1900

WCDMA 900 / 2100

ESGM 850 / 900 / 1800 / 1900

WCDMA 900 / 2100

ESGM 850 / 900 / 1800 / 1900

WCDMA 900 / 2100

Dimensions

115.5 x 63 x 10.4mm

115.5 x 63 x 10.4mm

141.3 x 77.7 x 10.8mm

Weight

128.66g

128.66g

190g

Standby time

2G = Up to 28.5 days

3G = Up to 22 days

2G = Up to 28.5 days

3G = Up to 22 days

2G = Up to 41 days

3G = Up to 26 days

Talk time

2G = Up to 13.3 hours

3G = Up to 10.5 hours

2G = Up to 13.3 hours

3G = Up to 10.5 hours

2G = Up to 16 hours

3G = Up to 13 hours

The Nokia X will be available to buy immediately in Asia Pacific, Europe, india, Latin America, the Middle-East and Africa. The Nokia X+ and XL are expected to be available from Q2 2014. The prices quoted do not include any local taxes or operator subsidies.

Latest Post

Technology

Popular Posts

About

This blog is about Ethical hacking and tips and tricks related to computer & Network technical issues, along with this you can discuss here about the IT security issues. Each and everyone have right to post his view through comments but no vulgar and abusive words are allowed otherwise we will take strict action on it.